Re: [Ietf-dkim] Welcome to the rechartered working group

2023-03-22 Thread Michael Thomas


On 3/22/23 4:00 PM, Emanuel Schorsch wrote:



On Wed, Mar 22, 2023 at 11:29 AM Murray S. Kucherawy 
 wrote:


On Sun, Mar 19, 2023 at 11:04 PM Emanuel Schorsch
 wrote:

In my mind, there are two important things I would like to see
achieved:

1) Distinguish indirect from direct flows (encode in some way
which server / mailingList the original DKIM message was
intended to come from). This is needed for domains that aren't
easily identifiable as direct flows (SPF isn't aligned by DKIM
in the direct case).


Wasn't ARC meant to solve this?  What have the results been?


ARC has the same challenge that DKIM has when it comes to replay. How 
do I know if this is direct mail or indirect mail? Which set of IPs 
should I expect the direct mail to be sent from? ARC allows forwarders 
to record/preserve authentication status but the same valid ARC 
headers can be sent millions of times from all kinds of different 
servers.


Note that DKIM has been able to sign auth-res from the very beginning. 
Which is why ARC getting inserted into discussions like this is both 
frustrating and just muddies the waters.





2) Give more info to identify benign indirect flows (E.g.
"forwarded on behalf of"). This is helpful for recognizing a
recipient's desired indirect flows.


I'm pretty sure this is easily spoofed.  So is any sort of tagging
or header field manipulation mechanism.  The spammer just needs to
make its mail look sufficiently like something you consider
legitimate, and they're in.

That is why it would be nice to see a solution less trivially 
spoofable than existing forwarding headers (e.g. X-Forwarded-For). If, 
for example, forwarded-for is recorded in the ARC header, then you can 
restrict yourself to trusting a specific pair of "forwarded-for" and 
ARC sealer, which is much more trustworthy than the header alone.


But, even an easily spoofable header is still useful. Easily spoofable 
means that it doesn't provide much protection against phishing, but it 
does make it substantially harder to scale for spam. Most people will 
have a limited set of sources which they receive indirect mail for, 
and those will vary widely between people. So if spammers, for the 
Forwarded-For header, need to get the right value per recipient it 
makes automating to a huge scale much more difficult.


But the spammer can also resign a message to make it look like an 
indirect flow along with whatever headers you insert. In the end this 
all boils down to how much you trust the domain sending you the message. 
For the domain the spammer controls, you'd hope they have a neutral to 
bad reputation. For legit mailing list providers, you'd hope they would 
get a positive reputation over time. None of this has anything to do 
with the problem that ARC purports to solve.


Mike
___
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim


Re: [Ietf-dkim] Welcome to the rechartered working group

2023-03-22 Thread Emanuel Schorsch
On Wed, Mar 22, 2023 at 11:29 AM Murray S. Kucherawy 
wrote:

> On Sun, Mar 19, 2023 at 11:04 PM Emanuel Schorsch  40google@dmarc.ietf.org> wrote:
>
>> In my mind, there are two important things I would like to see achieved:
>>
>> 1) Distinguish indirect from direct flows (encode in some way which
>> server / mailingList the original DKIM message was intended to come from).
>> This is needed for domains that aren't easily identifiable as direct flows
>> (SPF isn't aligned by DKIM in the direct case).
>>
>
> Wasn't ARC meant to solve this?  What have the results been?
>

ARC has the same challenge that DKIM has when it comes to replay. How do I
know if this is direct mail or indirect mail? Which set of IPs should I
expect the direct mail to be sent from? ARC allows forwarders to
record/preserve authentication status but the same valid ARC headers can be
sent millions of times from all kinds of different servers.

>
>
>> 2) Give more info to identify benign indirect flows (E.g. "forwarded on
>> behalf of"). This is helpful for recognizing a recipient's desired indirect
>> flows.
>>
>
> I'm pretty sure this is easily spoofed.  So is any sort of tagging or
> header field manipulation mechanism.  The spammer just needs to make its
> mail look sufficiently like something you consider legitimate, and they're
> in.
>
That is why it would be nice to see a solution less trivially spoofable
than existing forwarding headers (e.g. X-Forwarded-For). If, for example,
forwarded-for is recorded in the ARC header, then you can restrict yourself
to trusting a specific pair of "forwarded-for" and ARC sealer, which is
much more trustworthy than the header alone.

But, even an easily spoofable header is still useful. Easily spoofable
means that it doesn't provide much protection against phishing, but it does
make it substantially harder to scale for spam. Most people will have a
limited set of sources which they receive indirect mail for, and those will
vary widely between people. So if spammers, for the Forwarded-For header,
need to get the right value per recipient it makes automating to a huge
scale much more difficult.


> -MSK
> ___
> Ietf-dkim mailing list
> Ietf-dkim@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf-dkim
>
___
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim


Re: [Ietf-dkim] Welcome to the rechartered working group

2023-03-22 Thread Murray S. Kucherawy
On Sun, Mar 19, 2023 at 11:04 PM Emanuel Schorsch  wrote:

> In my mind, there are two important things I would like to see achieved:
>
> 1) Distinguish indirect from direct flows (encode in some way which server
> / mailingList the original DKIM message was intended to come from). This is
> needed for domains that aren't easily identifiable as direct flows (SPF
> isn't aligned by DKIM in the direct case).
>

Wasn't ARC meant to solve this?  What have the results been?


> 2) Give more info to identify benign indirect flows (E.g. "forwarded on
> behalf of"). This is helpful for recognizing a recipient's desired indirect
> flows.
>

I'm pretty sure this is easily spoofed.  So is any sort of tagging or
header field manipulation mechanism.  The spammer just needs to make its
mail look sufficiently like something you consider legitimate, and they're
in.

-MSK
___
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim


Re: [Ietf-dkim] Welcome to the rechartered working group

2023-03-21 Thread Alessandro Vesely

On Mon 20/Mar/2023 07:04:11 +0100 Emanuel Schorsch wrote:

In my mind, there are two important things I would like to see achieved:

1) Distinguish indirect from direct flows (encode in some way which server / 
mailingList the original DKIM message was intended to come from). This is 
needed for domains that aren't easily identifiable as direct flows (SPF isn't 
aligned by DKIM in the direct case).



Rather, one could try and rescue the ethical nature of direct flows by 
understanding the forwarder.  Consider, for example, a message where To: or Cc: 
mention l...@example.net, and there is a signature which has d=example.net, and 
finally SPF validates example.net too.  The flow is indirect, but there's an 
easy inference in this case.


If it is clear why a message was forwarder from the original header recipient 
to the actual envelope recipient, then it has the same worthiness as if it were 
direct.



2) Give more info to identify benign indirect flows (E.g. "forwarded on behalf 
of"). This is helpful for recognizing a recipient's desired indirect flows.



In an attempt at classifying indirect flows in order to justify forwarding,I 
drafted this:

https://datatracker.ietf.org/doc/draft-vesely-email-agreement/

The idea is that forwarding requires to set up something where the target email 
address is explicit.  If that is legitimate, it can as well be published.




Note that this isn't to say indirect mail would be deprecated.



Indeed, it'd be self-contradictory to discuss here a document which deprecates 
mailing lists.



Best
Ale
--





___
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim


Re: [Ietf-dkim] Welcome to the rechartered working group

2023-03-20 Thread Emanuel Schorsch
In my mind, there are two important things I would like to see achieved:

1) Distinguish indirect from direct flows (encode in some way which server
/ mailingList the original DKIM message was intended to come from). This is
needed for domains that aren't easily identifiable as direct flows (SPF
isn't aligned by DKIM in the direct case).
2) Give more info to identify benign indirect flows (E.g. "forwarded on
behalf of"). This is helpful for recognizing a recipient's desired indirect
flows.

Note that this isn't to say indirect mail would be deprecated. The goal is
to better distinguish the flows so we can have a minimally disruptive
response when Replay mitigations are needed. For example, consider the
approach of counting MessageIds. This has some side effects on benign mail.
The better we can identify the benign cases the easier it is to avoid
negatively affecting those even while a DKIM Replay attack is active.

On Sun, Mar 19, 2023 at 12:22 PM Scott Kitterman 
wrote:

>
>
> On March 19, 2023 6:57:13 PM UTC, Wei Chuang  40google@dmarc.ietf.org> wrote:
> >On Tue, Mar 7, 2023 at 4:10 AM Laura Atkins 
> wrote:
> >
> >> ...
> >> One of the panel members has shared the following from what he said at
> the
> >> session:
> >>
> >> * RFC 6376 itself says "x=" is not a viable mechanism to deal with
> replay.
> >> * There may only be a best practices solution, and not a protocol
> solution.
> >> * DKIM has since the beginning kept itself completely separate from the
> >> message transport.  Several of the proposed solutions (including mine)
> take
> >> leaps of varying sizes into the realm of DKIM knowing something about
> the
> >> transport; the lightweight ones connect the message to the envelope
> >> somehow, and the more heavyweight ones mean DKIM filters have to learn
> >> about MXes and whatnot.  We have to be absolutely certain that we want
> to
> >> break that wall if we go this way, because once we do, there will be no
> >> turning back.
> >>
> >
> >Agreed for the most part.  While we can get mileage with the existing
> >RFC6376 based tools such as header oversigning, "x=" expiry, and the other
> >techniques mentioned, at some point the spammers will adapt.  And as
> >Michael and the panelist have pointed out, RFC6376 inherently permits DKIM
> >replay as a feature due to that separation between envelope and message.
> >The main thing I would quibble with the panelist is the distinct break if
> >we start validating parts of the envelope or interacting with transport,
> as
> >whatever technique to be adopted will have to consider participation by
> >unaware forwarders i.e. some sort of gradual adoption process likely with
> >some sort of experiment.  Also I would argue we should break that wall
> >between the message and the envelope and transport.  From where I sit, I
> >see mail forwarding bit by bit breaking as spammers use forwarding as a
> >general technique, and the mitigations put in place using the existing
> >protocols are insufficient for the challenge.  The evidence is anecdotal
> >since there aren't great tools to look at this at scale.
>
> If we're going to deprecate indirect mail flows we should be explicit
> about it.  Standardizing protocol changes that make them look inherently
> suspicious while pretending that they are still supported is disingenuous
> and not the way to go about it.
>
> As far as I have seen, none of the proposals that break the boundary
> between envelope and the message body can distinguish between 'good' and
> 'bad' indirect mail.
>
> I do think we should, for the moment, continue to focus on the problem
> statement to see if we can come up with a technically distinct definition
> of the problem.
>
> Scott K
>
> ___
> Ietf-dkim mailing list
> Ietf-dkim@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf-dkim
>
___
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim


Re: [Ietf-dkim] Welcome to the rechartered working group

2023-03-19 Thread Suresh Ramasubramanian
Mainframes are part of computing history too but there’s more than one of them 
in production as we speak.  If there is no protocol and only a best practice 
solution then so be it.

--srs

From: Ietf-dkim  on behalf of Michael Thomas 

Sent: Monday, March 20, 2023 1:04 AM
To: ietf-dkim@ietf.org 
Subject: Re: [Ietf-dkim] Welcome to the rechartered working group

As far as coupling the envelope and body, that seems extremely likely to suffer 
from the law of unintended consequences. Frankly, as I wrote in my piece on 
throwing my hands up on mailing lists, the actual solution is to move to a 
non-email protocol since email is and will be forevermore broken wrt to 
authentication. It is not an eventuality that email must be the underlying 
transport for forum-like messaging. There is no particular necessity for 
email's distributed characteristic to run one. Mailing lists are mainly 
historical, imo.

Mike
___
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim


Re: [Ietf-dkim] Welcome to the rechartered working group

2023-03-19 Thread Hector Santos
Took a moment to go over this purported problem with replays:

1.1.  The problem

   Since many domains (including those of bad actors) list DKIM records,
   receiving systems track the history of messages using a DKIM-based
   domain name, to formulate a reputation for the name, and then to
   classify incoming emails.  


The way this is phrased suggest it is a common practice for a receiving system 
to “track the history of messages using a DKIM-based domain name.”

I’m not doing any such thing nor is any installation of our package.  What 
domain(s) or package(s) are doing this? 

As I read more, I believe too much stake is put on reputation which causes a 
heighten concern for a self-created problem by an ESP.

While an ESP may be considered “High Value” as an enterprise, i.e. gmail.com, 
by no means, is the domain “reputation” is “good” as “high”.   I don’t consider 
any ESP domain having a level of good reputation purely based their domain 
name. 

I am leaning towards this is not a DKIM issue.  It’s an ESP issue.  They need 
to deal with the potentials of malicious users.

Since day one,  DKIM was about establishing a technical method to prove 
authentication by keeping message integrity intact.  When verification 
deviated, a point of failure and possible actions was considered using a DKIM 
Policy Add-on, not a Reputation Protocol add-on simply because there are none 
(standard method).   

Unfortunately we removed SSP (which was built into DKIM), separated as ADSP and 
replaced with very poor substitute DMARC  and we continue to have issues with 
3rd party signature models.

The concerns about ESP reputation replay abuse is because they have a 
proprietary DKIM domain-based method for reputation.   This can be addressed 
but it requires a greater adoption of a DKIM Policy Protocol that is above and 
beyond what DMARC offers with its limited concepts and crippling alignment 
restraints.

In short, DKIM is fine.  Only a system using a proprietary reputation model 
based on its ESP domain has a higher replay problem. Systems that do not use a 
reputation model do not have this problem.

But, via POLICY if the domain using reputation wishes a verifier to put more 
restrictions on a received signed domain, i.e.  enforce `x=` expiration tag, I 
am all for it.

Thanks

Hector Santos CEO/CTO
Santronics Software, Inc.

 

> On Mar 7, 2023, at 7:09 AM, Laura Atkins  wrote:
> 
> All
> 
> The DKIM working group is now active again (thanks Murray!).  The chairs 
> wanted to send out a short note to welcome everyone and talk about our next 
> steps.
> 
> Our first deadline is next month - to get a consensus problem statement 
> submitted on the IETF data tracker at https://datatracker.ietf.org/group/dkim/
> 
> There is a current problem statement at 
> https://datatracker.ietf.org/doc/draft-chuang-dkim-replay-problem/. Please 
> take a moment to read through it and provide feedback. This chair thinks we 
> should not be providing solutions in the problem statement. We should be 
> primarily describing what the issue is and why we think the issue is with the 
> protocol. We will deal with solutions in the actual document. 
> 
> There was also a DKIM replay session at the most recent M3AAWG meeting. As I 
> understand it, they’re working on a BCP in parallel with the IETF. Many folks 
> are active in both groups. 
> 
> Due to M3AAWG privacy requirements, we are constrained in what we can share 
> from the meeting itself. However, if you were here and were on the panel or 
> part of the discussions, feel free to share with us some of your thoughts on 
> the problem, possible solutions and what your organizations have done to 
> address the issue. 
> 
> One of the panel members has shared the following from what he said at the 
> session:
> 
> * RFC 6376 itself says "x=" is not a viable mechanism to deal with replay.
> * There may only be a best practices solution, and not a protocol solution.
> * DKIM has since the beginning kept itself completely separate from the 
> message transport.  Several of the proposed solutions (including mine) take 
> leaps of varying sizes into the realm of DKIM knowing something about the 
> transport; the lightweight ones connect the message to the envelope somehow, 
> and the more heavyweight ones mean DKIM filters have to learn about MXes and 
> whatnot.  We have to be absolutely certain that we want to break that wall if 
> we go this way, because once we do, there will be no turning back.
> 
> There was also a DKIM replay session at the most recent M3AAWG meeting. As I 
> understand it, they’re working on a BCP in parallel with the IETF. Many folks 
> are active in both groups. 
> 
> Due to M3AAWG privacy requirements, we are constrained in what we can share 
> from the meeting itself. However, if you were here and were on the panel or 
> part of the discussions, feel free to share with us some of your thoughts on 
> the problem, possible solutions and what your organizations 

Re: [Ietf-dkim] Welcome to the rechartered working group

2023-03-19 Thread Michael Thomas


On 3/19/23 11:57 AM, Wei Chuang wrote:



On Tue, Mar 7, 2023 at 4:10 AM Laura Atkins  
wrote:


...
One of the panel members has shared the following from what he
said at the session:

* RFC 6376 itself says "x=" is not a viable mechanism to deal with
replay.
* There may only be a best practices solution, and not a protocol
solution.
* DKIM has since the beginning kept itself completely separate
from the message transport. Several of the proposed solutions
(including mine) take leaps of varying sizes into the realm of
DKIM knowing something about the transport; the lightweight ones
connect the message to the envelope somehow, and the more
heavyweight ones mean DKIM filters have to learn about MXes and
whatnot.  We have to be absolutely certain that we want to break
that wall if we go this way, because once we do, there will be no
turning back.


Agreed for the most part.  While we can get mileage with the existing 
RFC6376 based tools such as header oversigning, "x=" expiry, and the 
other techniques mentioned, at some point the spammers will adapt.  
And as Michael and the panelist have pointed out, RFC6376 inherently 
permits DKIM replay as a feature due to that separation between 
envelope and message.  The main thing I would quibble with the 
panelist is the distinct break if we start validating parts of the 
envelope or interacting with transport, as whatever technique to be 
adopted will have to consider participation by unaware forwarders i.e. 
some sort of gradual adoption process likely with some sort of 
experiment.  Also I would argue we should break that wall between the 
message and the envelope and transport.  From where I sit, I see mail 
forwarding bit by bit breaking as spammers use forwarding as a general 
technique, and the mitigations put in place using the existing 
protocols are insufficient for the challenge. The evidence is 
anecdotal since there aren't great tools to look at this at scale.


It should be noted that what DKIM says as a /protocol/ and what the 
receiver considers as a spam filtering MTA are not the same. DKIM 
rightfully has nothing to say about the envelope because it's not part 
of its bailiwick. That doesn't mean a receiver can't use the envelope 
for clues about spamminess. Spam filters are inherently heuristics while 
DKIM is deterministic.


As far as coupling the envelope and body, that seems extremely likely to 
suffer from the law of unintended consequences. Frankly, as I wrote in 
my piece on throwing my hands up on mailing lists, the actual solution 
is to move to a non-email protocol since email is and will be 
forevermore broken wrt to authentication. It is not an eventuality that 
email must be the underlying transport for forum-like messaging. There 
is no particular necessity for email's distributed characteristic to run 
one. Mailing lists are mainly historical, imo.


Mike
___
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim


Re: [Ietf-dkim] Welcome to the rechartered working group

2023-03-19 Thread Scott Kitterman


On March 19, 2023 6:57:13 PM UTC, Wei Chuang 
 wrote:
>On Tue, Mar 7, 2023 at 4:10 AM Laura Atkins  wrote:
>
>> ...
>> One of the panel members has shared the following from what he said at the
>> session:
>>
>> * RFC 6376 itself says "x=" is not a viable mechanism to deal with replay.
>> * There may only be a best practices solution, and not a protocol solution.
>> * DKIM has since the beginning kept itself completely separate from the
>> message transport.  Several of the proposed solutions (including mine) take
>> leaps of varying sizes into the realm of DKIM knowing something about the
>> transport; the lightweight ones connect the message to the envelope
>> somehow, and the more heavyweight ones mean DKIM filters have to learn
>> about MXes and whatnot.  We have to be absolutely certain that we want to
>> break that wall if we go this way, because once we do, there will be no
>> turning back.
>>
>
>Agreed for the most part.  While we can get mileage with the existing
>RFC6376 based tools such as header oversigning, "x=" expiry, and the other
>techniques mentioned, at some point the spammers will adapt.  And as
>Michael and the panelist have pointed out, RFC6376 inherently permits DKIM
>replay as a feature due to that separation between envelope and message.
>The main thing I would quibble with the panelist is the distinct break if
>we start validating parts of the envelope or interacting with transport, as
>whatever technique to be adopted will have to consider participation by
>unaware forwarders i.e. some sort of gradual adoption process likely with
>some sort of experiment.  Also I would argue we should break that wall
>between the message and the envelope and transport.  From where I sit, I
>see mail forwarding bit by bit breaking as spammers use forwarding as a
>general technique, and the mitigations put in place using the existing
>protocols are insufficient for the challenge.  The evidence is anecdotal
>since there aren't great tools to look at this at scale.

If we're going to deprecate indirect mail flows we should be explicit about it. 
 Standardizing protocol changes that make them look inherently suspicious while 
pretending that they are still supported is disingenuous and not the way to go 
about it.

As far as I have seen, none of the proposals that break the boundary between 
envelope and the message body can distinguish between 'good' and 'bad' indirect 
mail.

I do think we should, for the moment, continue to focus on the problem 
statement to see if we can come up with a technically distinct definition of 
the problem.

Scott K

___
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim


Re: [Ietf-dkim] Welcome to the rechartered working group

2023-03-19 Thread Wei Chuang
On Tue, Mar 7, 2023 at 4:10 AM Laura Atkins  wrote:

> ...
> One of the panel members has shared the following from what he said at the
> session:
>
> * RFC 6376 itself says "x=" is not a viable mechanism to deal with replay.
> * There may only be a best practices solution, and not a protocol solution.
> * DKIM has since the beginning kept itself completely separate from the
> message transport.  Several of the proposed solutions (including mine) take
> leaps of varying sizes into the realm of DKIM knowing something about the
> transport; the lightweight ones connect the message to the envelope
> somehow, and the more heavyweight ones mean DKIM filters have to learn
> about MXes and whatnot.  We have to be absolutely certain that we want to
> break that wall if we go this way, because once we do, there will be no
> turning back.
>

Agreed for the most part.  While we can get mileage with the existing
RFC6376 based tools such as header oversigning, "x=" expiry, and the other
techniques mentioned, at some point the spammers will adapt.  And as
Michael and the panelist have pointed out, RFC6376 inherently permits DKIM
replay as a feature due to that separation between envelope and message.
The main thing I would quibble with the panelist is the distinct break if
we start validating parts of the envelope or interacting with transport, as
whatever technique to be adopted will have to consider participation by
unaware forwarders i.e. some sort of gradual adoption process likely with
some sort of experiment.  Also I would argue we should break that wall
between the message and the envelope and transport.  From where I sit, I
see mail forwarding bit by bit breaking as spammers use forwarding as a
general technique, and the mitigations put in place using the existing
protocols are insufficient for the challenge.  The evidence is anecdotal
since there aren't great tools to look at this at scale.

-Wei


smime.p7s
Description: S/MIME Cryptographic Signature
___
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim


Re: [Ietf-dkim] Welcome to the rechartered working group

2023-03-19 Thread Michael Thomas


On 3/19/23 10:08 AM, Wei Chuang wrote:


  * DKIM replay was considered during development of RFC- hence
the "x=" tag

Considering that x= was mine from the beginning, I can say without 
question that replay wasn't what I had in mind. I always considered the 
replay problem to be bogus since "replay" is a perfectly legitimate use 
of email. It was more of "I don't want to take responsibility for this 
infinitely".


That said, there were tons of people -- many who still participate on 
this list -- who were against it.


Mike

___
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim


Re: [Ietf-dkim] Welcome to the rechartered working group

2023-03-19 Thread Wei Chuang
I was one of the M3AAWG 57 SF DKIM replay session organizers that helped
put together the slides, so I can try to summarize some of the things in
the slides.  (I was hit with Covid so couldn't attend in person)  M3AAWG
has a confidentiality policy to permit greater knowledge sharing among
participants so I will be sensitive and respectful of those concerns.  So I
apologize if I leave something out, but it might be because something was
indeed sensitive or I suspect it is, and of course I missed the actual
session, so don't know what was said in person.  The following is a high
level outline of the slides/talk:

   - Introduction and description of DKIM replay noting the False-Negative
   and False Positive effects on reputation systems
   - Description of DKIM Replay detection techniques and effects observed
   by senders and receivers
   - Summary of existing DKIM replay mitigations based on tools available
   in RFC6376
   - DKIM development history wrt DKIM Replay
   - M3AAWG 56 Brooklyn BoF / IETF 115 Dispatch proposals
  - Recipient in the signature proposals/drafts
  - Gather per-hop signatures proposals/drafts
  - Problem statement draft

The session reuses some of the IETF 115 Dispatch DKIM Replay slides i.e.
the introduction and proposals, meaning you can find the content there.

Some interesting points:

   - Several senders described using Gmail Postmaster Tools for detection
   of DKIM replay
  - to look for changes to reputation, user reported spam, and volume
   - Summary of existing DKIM replay mitigations based on tools available
   in RFC6376
  - DKIM header oversigning.  Some discussion on which headers.
  - DKIM timestamp and expiry.  Discussion of expiry durations.
  - Signature counting.  Acknowledged False Positives which needs
  support to mitigate, but the claim is DKIM replay isn't a
problem for that
  receiver i.e. highly successful.
  - Key rotation
   - DKIM replay was considered during development of RFC- hence the "x="
   tag
   - Advice for DKIM WG success?  To encourage folks to participate in the
   mailing list discussion

thanks,
-Wei

On Tue, Mar 7, 2023 at 4:10 AM Laura Atkins  wrote:

> All
>
> The DKIM working group is now active again (thanks Murray!).  The chairs
> wanted to send out a short note to welcome everyone and talk about our next
> steps.
>
> Our first deadline is next month - to get a consensus problem statement
> submitted on the IETF data tracker at
> https://datatracker.ietf.org/group/dkim/
>
> There is a current problem statement at
> https://datatracker.ietf.org/doc/draft-chuang-dkim-replay-problem/.
> Please take a moment to read through it and provide feedback. This chair
> thinks we should not be providing solutions in the problem statement. We
> should be primarily describing what the issue is and why we think the issue
> is with the protocol. We will deal with solutions in the actual document.
>
> There was also a DKIM replay session at the most recent M3AAWG meeting. As
> I understand it, they’re working on a BCP in parallel with the IETF. Many
> folks are active in both groups.
>
> Due to M3AAWG privacy requirements, we are constrained in what we can
> share from the meeting itself. However, if you were here and were on the
> panel or part of the discussions, feel free to share with us some of your
> thoughts on the problem, possible solutions and what your organizations
> have done to address the issue.
>
> One of the panel members has shared the following from what he said at the
> session:
>
> * RFC 6376 itself says "x=" is not a viable mechanism to deal with replay.
> * There may only be a best practices solution, and not a protocol solution.
> * DKIM has since the beginning kept itself completely separate from the
> message transport.  Several of the proposed solutions (including mine) take
> leaps of varying sizes into the realm of DKIM knowing something about the
> transport; the lightweight ones connect the message to the envelope
> somehow, and the more heavyweight ones mean DKIM filters have to learn
> about MXes and whatnot.  We have to be absolutely certain that we want to
> break that wall if we go this way, because once we do, there will be no
> turning back.
>
> There was also a DKIM replay session at the most recent M3AAWG meeting. As
> I understand it, they’re working on a BCP in parallel with the IETF. Many
> folks are active in both groups.
>
> Due to M3AAWG privacy requirements, we are constrained in what we can
> share from the meeting itself. However, if you were here and were on the
> panel or part of the discussions, feel free to share with us some of your
> thoughts on the problem, possible solutions and what your organizations
> have done to address the issue.
>
> We will not meet in Yokohama due to the timing of being rechartered, but
> we are considering a one hour interim in April if there appears to be
> points of discussion.
>
> laura (as chair)
>
> --
> The Delivery 

Re: [Ietf-dkim] Welcome to the rechartered working group

2023-03-10 Thread Dave Crocker



The reason that I think it would be useful in the problem statement is 
that it would give a way to get people up to speed.



Both of the Problem Statement drafts have text relevant to the topic of 
solution proposal.


d/

--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
mast:@dcrocker@mastodon.social

___
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim


Re: [Ietf-dkim] Welcome to the rechartered working group

2023-03-10 Thread Michael Thomas


On 3/10/23 7:54 AM, Scott Kitterman wrote:

On Friday, March 10, 2023 9:14:05 AM EST Laura Atkins wrote:


What about solutions that have been tried but have drawbacks or are
ineffective? It would be nice to know what the current baseline is.

In some respects that depends on what form the final document takes. If we
do decide that the underlying problem is something that can be addressed
with a protocol change, then we probably won’t mention mitigation steps
that have been tried and either have drawbacks or are ineffective. If the
outcome is a document that we looked at the problem and decided that the
issue isn’t with the protocol and we recommend no protocol changes then I
can see the work product being a discussion of non-protocol solution space.
That would include different things folks have tried what works and what
doesn’t work.

My suggestion is plan on both.

My takeaway from the rechartering discussions is that if there is a protocol
solution to this problem, it will not be simple and will take quite some time
to be effective since wide deployment would be needed.  As a result, there will
be, at best, a significant period of time where whatever mitigations/work-
arounds that are available will be needed.  I think we should plan on
documenting them regardless of the outcome of the protocol solution work.

The reason that I think it would be useful in the problem statement is 
that it would give a way to get people up to speed. Not everybody takes 
part in closed industry groups so the specifics such that they are 
public in any form are important if this working group is going achieve 
anything novel. Considering how aggressive the schedule is, there isn't 
a lot of time for wheel reinvention.


Mike

___
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim


Re: [Ietf-dkim] Welcome to the rechartered working group

2023-03-10 Thread Dave Crocker

On 3/10/2023 6:14 AM, Laura Atkins wrote:
Do you have any questions, edits or specific wording related to better 
explaining the problem for either of the drafts that are currently 
under discussion? 



Does anyone have comments on the substance -- and especially about the 
differences -- between the two problem statement drafts?


Preferences?  Disagreements?  Suggested wording/content changes?

d/

--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
mast:@dcrocker@mastodon.social

___
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim


Re: [Ietf-dkim] Welcome to the rechartered working group

2023-03-10 Thread Michael Thomas


On 3/10/23 6:14 AM, Laura Atkins wrote:




On 9 Mar 2023, at 22:47, Michael Thomas  wrote:


On 3/7/23 4:09 AM, Laura Atkins wrote:
There is a current problem statement at 
https://datatracker.ietf.org/doc/draft-chuang-dkim-replay-problem/. 
Please take a moment to read through it and provide feedback. This 
chair thinks we should not be providing solutions in the problem 
statement. We should be primarily describing what the issue is and 
why we think the issue is with the protocol. We will deal with 
solutions in the actual document.


What about solutions that have been tried but have drawbacks or are 
ineffective? It would be nice to know what the current baseline is.


In some respects that depends on what form the final document takes. 
If we do decide that the underlying problem is something that can be 
addressed with a protocol change, then we probably won’t mention 
mitigation steps that have been tried and either have drawbacks or are 
ineffective. If the outcome is a document that we looked at the 
problem and decided that the issue isn’t with the protocol and we 
recommend no protocol changes then I can see the work product being a 
discussion of non-protocol solution space. That would include 
different things folks have tried what works and what doesn’t work.


I'm speaking only of the problem statement draft. Listing off things 
have already been tried or considered and rejected would shorten the 
cycle when the next phase starts. And I thought that considering 
solutions was out of scope, so considering protocol changes would be out 
of scope too.



Also: I continue to be concerned about the hand wave-iness of the 
problem. That is both from the standpoint of M3AAWG which is members 
only and more importantly from various vendors who for their own 
reasons have little or no desire to disclose pertinent pieces of 
information in public. It's rather hard to "fix" a black box when you 
don't even know what it's doing.


You made your concerns abundantly clear during the re-chartering 
discussion. Given the IETF chose to recharter, the next steps are to 
craft a problem statement that documents and explains a DKIM replay 
attack in a way that’s accessible and understandable.


Do you have any questions, edits or specific wording related to better 
explaining the problem for either of the drafts that are currently 
under discussion?


I sent out a post with about 20 questions several weeks ago and got no 
response.


Mike
___
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim


Re: [Ietf-dkim] Welcome to the rechartered working group

2023-03-10 Thread Scott Kitterman
On Friday, March 10, 2023 9:14:05 AM EST Laura Atkins wrote:
> > On 9 Mar 2023, at 22:47, Michael Thomas  wrote:
> > 
> > On 3/7/23 4:09 AM, Laura Atkins wrote:
> >> There is a current problem statement at
> >> https://datatracker.ietf.org/doc/draft-chuang-dkim-replay-problem/.
> >> Please take a moment to read through it and provide feedback. This chair
> >> thinks we should not be providing solutions in the problem statement. We
> >> should be primarily describing what the issue is and why we think the
> >> issue is with the protocol. We will deal with solutions in the actual
> >> document.> 
> > What about solutions that have been tried but have drawbacks or are
> > ineffective? It would be nice to know what the current baseline is.
> In some respects that depends on what form the final document takes. If we
> do decide that the underlying problem is something that can be addressed
> with a protocol change, then we probably won’t mention mitigation steps
> that have been tried and either have drawbacks or are ineffective. If the
> outcome is a document that we looked at the problem and decided that the
> issue isn’t with the protocol and we recommend no protocol changes then I
> can see the work product being a discussion of non-protocol solution space.
> That would include different things folks have tried what works and what
> doesn’t work.

My suggestion is plan on both.

My takeaway from the rechartering discussions is that if there is a protocol 
solution to this problem, it will not be simple and will take quite some time 
to be effective since wide deployment would be needed.  As a result, there will 
be, at best, a significant period of time where whatever mitigations/work-
arounds that are available will be needed.  I think we should plan on 
documenting them regardless of the outcome of the protocol solution work.

Scott K


___
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim


Re: [Ietf-dkim] Welcome to the rechartered working group

2023-03-10 Thread Laura Atkins


> On 9 Mar 2023, at 22:47, Michael Thomas  wrote:
> 
> 
> On 3/7/23 4:09 AM, Laura Atkins wrote:
>> There is a current problem statement at 
>> https://datatracker.ietf.org/doc/draft-chuang-dkim-replay-problem/. Please 
>> take a moment to read through it and provide feedback. This chair thinks we 
>> should not be providing solutions in the problem statement. We should be 
>> primarily describing what the issue is and why we think the issue is with 
>> the protocol. We will deal with solutions in the actual document.
> 
> What about solutions that have been tried but have drawbacks or are 
> ineffective? It would be nice to know what the current baseline is.

In some respects that depends on what form the final document takes. If we do 
decide that the underlying problem is something that can be addressed with a 
protocol change, then we probably won’t mention mitigation steps that have been 
tried and either have drawbacks or are ineffective. If the outcome is a 
document that we looked at the problem and decided that the issue isn’t with 
the protocol and we recommend no protocol changes then I can see the work 
product being a discussion of non-protocol solution space. That would include 
different things folks have tried what works and what doesn’t work. 

> Also: I continue to be concerned about the hand wave-iness of the problem. 
> That is both from the standpoint of M3AAWG which is members only and more 
> importantly from various vendors who for their own reasons have little or no 
> desire to disclose pertinent pieces of information in public. It's rather 
> hard to "fix" a black box when you don't even know what it's doing.

You made your concerns abundantly clear during the re-chartering discussion. 
Given the IETF chose to recharter, the next steps are to craft a problem 
statement that documents and explains a DKIM replay attack in a way that’s 
accessible and understandable.  

Do you have any questions, edits or specific wording related to better 
explaining the problem for either of the drafts that are currently under 
discussion? 

laura 

-- 
The Delivery Experts

Laura Atkins
Word to the Wise
la...@wordtothewise.com 

Email Delivery Blog: http://wordtothewise.com/blog  






___
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim


Re: [Ietf-dkim] Welcome to the rechartered working group

2023-03-09 Thread Michael Thomas



On 3/7/23 4:09 AM, Laura Atkins wrote:
There is a current problem statement at 
https://datatracker.ietf.org/doc/draft-chuang-dkim-replay-problem/. 
Please take a moment to read through it and provide feedback. This 
chair thinks we should not be providing solutions in the problem 
statement. We should be primarily describing what the issue is and why 
we think the issue is with the protocol. We will deal with solutions 
in the actual document.


What about solutions that have been tried but have drawbacks or are 
ineffective? It would be nice to know what the current baseline is.


Also: I continue to be concerned about the hand wave-iness of the 
problem. That is both from the standpoint of M3AAWG which is members 
only and more importantly from various vendors who for their own reasons 
have little or no desire to disclose pertinent pieces of information in 
public. It's rather hard to "fix" a black box when you don't even know 
what it's doing.


Mike

___
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim


[Ietf-dkim] Welcome to the rechartered working group

2023-03-07 Thread Laura Atkins
All

The DKIM working group is now active again (thanks Murray!).  The chairs wanted 
to send out a short note to welcome everyone and talk about our next steps.

Our first deadline is next month - to get a consensus problem statement 
submitted on the IETF data tracker at https://datatracker.ietf.org/group/dkim/

There is a current problem statement at 
https://datatracker.ietf.org/doc/draft-chuang-dkim-replay-problem/. Please take 
a moment to read through it and provide feedback. This chair thinks we should 
not be providing solutions in the problem statement. We should be primarily 
describing what the issue is and why we think the issue is with the protocol. 
We will deal with solutions in the actual document. 

There was also a DKIM replay session at the most recent M3AAWG meeting. As I 
understand it, they’re working on a BCP in parallel with the IETF. Many folks 
are active in both groups. 

Due to M3AAWG privacy requirements, we are constrained in what we can share 
from the meeting itself. However, if you were here and were on the panel or 
part of the discussions, feel free to share with us some of your thoughts on 
the problem, possible solutions and what your organizations have done to 
address the issue. 

One of the panel members has shared the following from what he said at the 
session:

* RFC 6376 itself says "x=" is not a viable mechanism to deal with replay.
* There may only be a best practices solution, and not a protocol solution.
* DKIM has since the beginning kept itself completely separate from the message 
transport.  Several of the proposed solutions (including mine) take leaps of 
varying sizes into the realm of DKIM knowing something about the transport; the 
lightweight ones connect the message to the envelope somehow, and the more 
heavyweight ones mean DKIM filters have to learn about MXes and whatnot.  We 
have to be absolutely certain that we want to break that wall if we go this 
way, because once we do, there will be no turning back.

There was also a DKIM replay session at the most recent M3AAWG meeting. As I 
understand it, they’re working on a BCP in parallel with the IETF. Many folks 
are active in both groups. 

Due to M3AAWG privacy requirements, we are constrained in what we can share 
from the meeting itself. However, if you were here and were on the panel or 
part of the discussions, feel free to share with us some of your thoughts on 
the problem, possible solutions and what your organizations have done to 
address the issue. 

We will not meet in Yokohama due to the timing of being rechartered, but we are 
considering a one hour interim in April if there appears to be points of 
discussion.

laura (as chair) 

-- 
The Delivery Experts

Laura Atkins
Word to the Wise
la...@wordtothewise.com 

Email Delivery Blog: http://wordtothewise.com/blog  






___
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim